O'Reilly logo

Mastering LOB Development for Silverlight 5: A Case Study in Action by Rocío Serrano, Braulio Díez

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Server-side and communication security

In the previous section, we learned how to try and secure our application on the client side, and that it is nearly impossible to avoid any malicious attack or manipulation.

Now, we are going to learn how to add security on the server side, the last frontier a hacker has to face and the one where we have more control.

Validations

As we saw earlier, the server must not trust the validity of the information that comes from the client, as it can never be guaranteed that the data came from our application. These could come from a pretender, or even another application of ours, which shares the service. Therefore, it may have ignored all the validations implemented in our Silverlight application.

Due to this, the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required